咨询与建议

限定检索结果

文献类型

  • 1,596 篇 会议
  • 1,350 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,646 篇 工学
    • 943 篇 计算机科学与技术...
    • 764 篇 软件工程
    • 279 篇 信息与通信工程
    • 226 篇 电子科学与技术(可...
    • 216 篇 电气工程
    • 204 篇 生物工程
    • 196 篇 控制科学与工程
    • 177 篇 生物医学工程(可授...
    • 154 篇 光学工程
    • 150 篇 化学工程与技术
    • 129 篇 材料科学与工程(可...
    • 103 篇 机械工程
    • 85 篇 仪器科学与技术
    • 84 篇 动力工程及工程热...
    • 70 篇 土木工程
  • 1,184 篇 理学
    • 492 篇 物理学
    • 419 篇 数学
    • 292 篇 生物学
    • 179 篇 化学
    • 176 篇 统计学(可授理学、...
    • 71 篇 系统科学
  • 400 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 191 篇 图书情报与档案管...
    • 136 篇 工商管理
  • 210 篇 医学
    • 165 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 66 篇 公共卫生与预防医...
    • 66 篇 药学(可授医学、理...
  • 99 篇 教育学
    • 93 篇 教育学
  • 81 篇 法学
    • 72 篇 社会学
  • 72 篇 农学
  • 53 篇 经济学
  • 8 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 52 篇 computer science
  • 46 篇 accuracy
  • 43 篇 machine learning
  • 42 篇 feature extracti...
  • 39 篇 internet of thin...
  • 38 篇 deep learning
  • 36 篇 training
  • 34 篇 data mining
  • 34 篇 visualization
  • 34 篇 students
  • 33 篇 education
  • 33 篇 computational mo...
  • 31 篇 covid-19
  • 26 篇 artificial intel...
  • 25 篇 predictive model...
  • 22 篇 support vector m...
  • 22 篇 computer archite...
  • 22 篇 data models
  • 21 篇 real-time system...
  • 20 篇 optimization

机构

  • 27 篇 computer science...
  • 24 篇 school of physic...
  • 22 篇 department of ph...
  • 22 篇 department of ph...
  • 21 篇 kavli institute ...
  • 21 篇 university of ch...
  • 20 篇 computer science...
  • 19 篇 physics division...
  • 19 篇 enrico fermi ins...
  • 18 篇 applied mathemat...
  • 17 篇 department of as...
  • 16 篇 advanced institu...
  • 16 篇 harvey mudd coll...
  • 16 篇 computer science...
  • 16 篇 nist quantum dev...
  • 15 篇 fermi national a...
  • 14 篇 school of physic...
  • 14 篇 applied computer...
  • 14 篇 department of ph...
  • 13 篇 department of ph...

作者

  • 35 篇 gaol ford lumban
  • 29 篇 muhammad zarlis
  • 22 篇 jasra ajay
  • 21 篇 heryadi yaya
  • 20 篇 halverson n.w.
  • 20 篇 benson b.a.
  • 20 篇 padin s.
  • 19 篇 everett w.
  • 19 篇 ruhl j.e.
  • 19 篇 bender a.n.
  • 18 篇 whitehorn n.
  • 18 篇 smecher g.
  • 18 篇 schaffer k.k.
  • 18 篇 bens pardamean
  • 18 篇 holzapfel w.l.
  • 18 篇 novosad v.
  • 18 篇 matsuo tokuro
  • 18 篇 holder g.p.
  • 17 篇 meyer s.s.
  • 17 篇 nibarger j.p.

语言

  • 2,856 篇 英文
  • 75 篇 其他
  • 17 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Program in Computer Science & Technology"
2955 条 记 录,以下是151-160 订阅
排序:
Virtual Summer School in Second life: Supporting creative communities
Virtual Summer School in Second life: Supporting creative co...
收藏 引用
IADIS International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2012
作者: Fominykh, Mikhail Prasolova-Førland, Ekaterina Divitini, Monica Program for Learning with ICT Norwegian University of Science and Technology Norway Department of Computer and Information Science Norwegian University of Science and Technology Norway
Creativity can be applied to every domain of knowledge and must be seen as an important competence. Supporting social creativity across different domains and disciplines in learning communities is an important part of... 详细信息
来源: 评论
Supporting collaborative creativity with educational visualizations in 3D virtual worlds
Supporting collaborative creativity with educational visuali...
收藏 引用
2012 International Workshops on Web-Based Learning, ICWL 2012 - KMEL, SciLearn, and CCSTED
作者: Fominykh, Mikhail Divitini, Monica Prasolova-Førland, Ekaterina Program for Learning with ICT Norwegian University of Science and Technology Norway Department of Computer and Information Science Norwegian University of Science and Technology Norway
Social media are known for substantial creativity support, as they allow users exploring, creating, and sharing various types of content. Social 3D virtual worlds, such as Second Life, can also be seen as a social med... 详细信息
来源: 评论
Predictive Value Chain Analysis to Improve Generalization Accuracy In Quality Assurance
Predictive Value Chain Analysis to Improve Generalization Ac...
收藏 引用
2024 International Conference on Control and Automation, Electronics, Robotics, Internet of Things, and Artificial Intelligence, CERIA 2024
作者: Harmayani Sihombing, Poltak Mahyudin Elveny, Marischa Universitas Sumatera Utara Postgraduate Program in Computer Science Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Postgraduate Doctorate in Computer Science Medan Indonesia
Adaptive predictive analysis model utilizing Spiking Neural Networks (SNNs) to enhance quality assurance processes in Smart Campus environments. Traditional predictive models often struggle with the dynamic and comple... 详细信息
来源: 评论
Multiview playback with ghost in required condition
Multiview playback with ghost in required condition
收藏 引用
26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
作者: Tanaka, Yoshiyuki Komoriya, Kenji Uda, Ryuya Computer Science Program Tokyo University of Technology Graduate School Hachioji city Japan School of Computer Science Tokyo University of Technology Hachioji city Japan
Modern society has recently had problems with a variety of crimes. Surveillance cameras have been installed in various locations to protect assets from these crimes. When the incident occurred, it is needed to manuall... 详细信息
来源: 评论
Privacy protection on transfer system of automated teller machine from brute force attack
Privacy protection on transfer system of automated teller ma...
收藏 引用
26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
作者: Kurita, Sho Komoriya, Kenji Uda, Ryuya Computer Science Program Tokyo University of Technology Graduate School Hachioji city Japan School of Computer Science Tokyo University of Technology Hachioji city Japan
Currently, an authentication system used in banks is to protect assets of users. However, these systems are weak against the peeping attack. That is high risk. Therefore, we proposed that a user safely enters credenti... 详细信息
来源: 评论
Model of Web Based Application to Control Bridge Traveler Using Raspberry Pi  3
Model of Web Based Application to Control Bridge Traveler Us...
收藏 引用
3rd International Conference on computer science and Computational Intelligence, ICCSCI 2018
作者: Wisnusenna, Sebastian Yonatan, Michael Sunardy Wibisurya, Aswin Fanny Yuwono, Teguh Computer Science Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mobile Appication and Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Struktur Pintar Indonesia Jakarta12950 Indonesia
Bridge traveler is used to facilitate the construction and maintenance of a bridge which is controlled using control panel buttons, located inside the traveler. However, this method leads to some problems, like a diff... 详细信息
来源: 评论
Optimizing solar-powered multi-generation systems for sustainable energy management in university buildings using Neural Networks and Genetic Algorithms
收藏 引用
Journal of Building Engineering 2025年 108卷
作者: Assareh, Ehsanolah Izadyar, Nima Jamei, Elmira Monzavian, Mohammad amin Agarwal, Saurabh Agarwal, Neha Strategic Research Institute (SRI) Asia Pacific University of Technology and Innovation (APU) Technology Park Malaysia Kuala Lumpur Built Environment and Engineering Program College of Sport Health and Engineering (CoSHE) Victoria University Melbourne Australia Department of Renewable Energy Technology Materials and Energy Research Center Dezful Branch Islamic Azad University Dezful Iran Institute for Sustainable Industries and Liveable Cities Victoria University Melbourne 3011 VIC Australia School of Computer Science and Engineering Yeungnam University Gyeongsan 38541 South Korea School of Chemical Engineering Yeungnam University Gyeongsan 38541 South Korea
University campuses operate like small cities, with complex energy demands driven by diverse activities, making energy management particularly challenging in extreme climates. Traditional energy systems often rely on ... 详细信息
来源: 评论
Apriori data mining on rotationally invariant multiresolutional moments for pattern recognition
Apriori data mining on rotationally invariant multiresolutio...
收藏 引用
9th Joint Conference on Information sciences, JCIS 2006
作者: Rodtook, A. Makhanov, S.S. Department of Computer Science Ramkhamhaeng University Thailand Information Technology and Computer Program Sirindhorn International Institute of Technology Thammasat University Thailand
We propose a new feature selection procedure based on a combination of a pruning algorithm, Apriori mining techniques and fuzzy C-mean clustering. The feature selection algorithm is designed to mine on a multiresoluti... 详细信息
来源: 评论
Dynamic Model for Determining Disaster Evacuation Locations with Game Theory  1
Dynamic Model for Determining Disaster Evacuation Locations ...
收藏 引用
1st International Conference on Advanced Information Scientific Development, ICAISD 2020
作者: Safii, M. Efendi, Syahril Zarlis, Muhammad Mawengkang, Herman Doctoral Program Faculty of Computer Science and Information Technology Universitas Sumatera Utara Indonesia
Disaster management can be grouped into three stages with several activities that can be carried out starting from pre-disaster, during emergency response and post-disaster. In the pre-disasterstage one of which is mi... 详细信息
来源: 评论
Confidential information poisoning methods by considering the information length in electronic portable devices
Confidential information poisoning methods by considering th...
收藏 引用
26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
作者: Ishii, Junya Razali, Afiza Uda, Ryuya Computer Science Program Tokyo University of Technology Graduate School Hachioji City Japan
To prevent leakage of personal information and privacy, there is an AR technology in which secret information from handy device is overlaid on paper on which nothing about personal information is printed. The inventio... 详细信息
来源: 评论